With more and more transactions happening online, and a dramatic increase in incidents involving brands and fraudsters on the Web, the concept of online trust has never been so vital for businesses. In this webinar you will learn how to help prevent these incidents by leveraging the Web PKI to display your business identity online: we will explain the principles of trust through business authentication and how to show your identity to your visitors thanks to various types of digital certificates.

We will run through the benefits of business authentication, what the current best practices and policies are for both e-commerce and Enterprise businesses when it comes to trust, what is mandatory and what is coming. We will help you clarify priorities for your business and provide some action plans.

In your eco-systems with apps across numerous platforms, and where you possibly are fielding millions of IoT devices, preventing mistrust, and avoiding damaging malware targeting your customers is priority one. We will talk about challenges of remediation when things go wrong, and suggest some solutions to the complexities of managing code-signing and keys at scale.

After a brief introduction to the world of SEO, we will dive into the different types of web application attacks and manipulations that are made to either degrade your competitor’s ranking or raise your own.

With the explosion of connected objects and mobile devices, publishing or sharing software - even internally - has become a real challenge for companies with a coding activity. In this webinar, we will explore the code signing threat landscape and share our best practice and solutions to all your code signing needs. You will learn about:

- the value of code signing today and the new code signing use cases in the world of IoT

- the risks associated with traditional code signing: key management, auditing and reporting, multitude of signing platforms and files, compliance, embedding in the development process, etc.

- the security and development costs to take into account

- how to transition from a traditional to a next generation code signing activity thanks to Cloud based signing

Over the last few months we have seen DDoS attacks become more ferocious and attackers more sophisticated. As DDoS threats continue to evolve, your traditional mitigation solution may not be enough to protect you.

Watch as we follow a fictitious attacker analysing a target, exploring and finding weaknesses. Experience how the attacker launches a DDoS attack with devastating effects. Learn about the advantages and limitations of various mitigation technologies, and be given a DDoS preparedness roadmap to help you navigate the DDoS landscape.

Symantec Website Security Solutions take SSL protection and trust to a whole new level. Secure your website, increase customers' confidence, and reach the full online potential of your business. You can learn about the threat landscape and Symantec product updates by subscribing to this channel.